svn commit: r532291 - head/security/vuxml
Dan Langille
dan at langille.org
Fri Apr 24 14:28:07 UTC 2020
On Wed, Apr 22, 2020, at 1:25 PM, Dan Langille wrote:
> On Tue, Apr 21, 2020, at 2:29 PM, Gordon Tetlow wrote:
> > Author: gordon (src committer)
> > Date: Tue Apr 21 18:29:59 2020
> > New Revision: 532291
> > URL: https://svnweb.freebsd.org/changeset/ports/532291
> >
> > Log:
> > Add new entries for SA-20:10 and SA-20:11.
> >
> > Modified:
> > head/security/vuxml/vuln.xml
> >
> > Modified: head/security/vuxml/vuln.xml
> > ==============================================================================
> > --- head/security/vuxml/vuln.xml Tue Apr 21 18:22:15 2020 (r532290)
> > +++ head/security/vuxml/vuln.xml Tue Apr 21 18:29:59 2020 (r532291)
> > @@ -58,6 +58,71 @@ Notes:
> > * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
> > -->
>
> [snip]
>
> > +
> > + <vuln vid="33edcc56-83f2-11ea-92ab-00163e433440">
> > + <topic>FreeBSD -- ipfw invalid mbuf handling</topic>
> > + <affects>
> > + <package>
> > + <name>FreeBSD-kernel</name>
> > + <range><ge>12.1</ge><lt>12.1_4</lt></range>
> > + <range><ge>11.3</ge><lt>11.3_8</lt></range>
> > + </package>
> > + </affects>
> > + <description>
> > + <body xmlns="http://www.w3.org/1999/xhtml">
> > + <h1>Problem Description:</h1>
> > + <p>Incomplete packet data validation may result in accessing
> > + out-of-bounds memory (CVE-2019-5614) or may access memory after it has
> > + been freed (CVE-2019-15874).</p>
> > + <h1>Impact:</h1>
> > + <p>Access to out of bounds or freed mbuf data can lead to a kernel panic or
> > + other unpredictable results.</p>
> > + </body>
> > + </description>
> > + <references>
> > + <cvename>CVE-2019-5614</cvename>
> > + <cvename>CVE-2019-15874</cvename>
> > + <freebsdsa>SA-20:10.ipfw</freebsdsa>
> > + </references>
> > + <dates>
> > + <discovery>2020-04-21</discovery>
> > + <entry>2020-04-21</entry>
> > + </dates>
> > + </vuln>
> > +
> > <vuln vid="9fbaefb3-837e-11ea-b5b4-641c67a117d8">
> > <topic>py-twisted -- multiple vulnerabilities</topic>
> > <affects>
> >
>
> This entry is raising a false positive on patched systems. To reproduce:
>
> freebsd-update fetch install
> reboot
> pkg install base-audit
> add security_status_baseaudit_enable="YES" to /etc/periodic.conf
> pkg audit -F
> /usr/local/etc/periodic/security/405.pkg-base-audit
>
> $ freebsd-version -uk
> 12.1-RELEASE-p3
> 12.1-RELEASE-p4
>
> $ /usr/local/etc/periodic/security/405.pkg-base-audit
>
> Checking for security vulnerabilities in base (userland & kernel):
> Host system:
> Database fetched: Wed Apr 22 11:30:00 UTC 2020
> FreeBSD-kernel-12.1_3 is vulnerable:
> FreeBSD -- ipfw invalid mbuf handling
> CVE: CVE-2019-15874
> CVE: CVE-2019-5614
> WWW: https://vuxml.FreeBSD.org/freebsd/33edcc56-83f2-11ea-92ab-00163e433440.html
>
> 1 problem(s) in 1 installed package(s) found.
> 0 problem(s) in 0 installed package(s) found.
PR raised: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=245878
--
Dan Langille
dan at langille.org
More information about the svn-ports-all
mailing list